
Chapter 5 & 6 Review
Authored by Melissa DiCenzo
Computers
9th - 12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of a white hat hacker?
modifying data
stealing data
protecting data
validating data
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three elements should be combined when creating a strong password? (Choose three.)
personal information
dictionary words
combinations of letters and numbers
special characters
pet names
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are USB flash drives a security risk?
They cannot be encrypted.
They contain a remote sensor.
They contain wireless antennas.
They have a controller that can be infected.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can a virtual assistant be a security risk?
Encryption protocols are not supported.
Personal information could be leaked.
Personal devices could be remotely seen.
Sensor options could be modified.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three examples of personally identifiable information? (Choose three.)
home thermometer value
bank account number
birth date
vehicle fuel consumption
vehicle identification number
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a goal of performing a risk assessment?
educating users in secure procedures
outlining job duties and expectations
restricting access to physical assets
valuing assets to justify security expenditures
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three passwords are the least secure? (Choose three.)
asdfghjkl
randolph
135792468
Ci3c0_RocK$
s3CurE_p@ss
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?